×

Image encryption using DNA addition combining with chaotic maps. (English) Zbl 1207.94068

Summary: A new image encryption scheme based on DNA sequence addition operation and chaos is presented. First, a DNA sequence matrix is obtained by encoding the original image, then, divide the DNA sequence matrix into some equal blocks and use the DNA sequence addition operation to add these blocks. Next, perform the DNA sequence complement operation to the result of the added matrix by using two Logistic maps. Finally, decode the DNA sequence matrix from the third step, and we can get the encrypted image. The simulation experimental results and security analysis show that our scheme not only can achieve good encryption, but can also resist exhaustive attack, statistical attack and differential attack.

MSC:

94A62 Authentication, digital signatures and secret sharing
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
94A60 Cryptography
Full Text: DOI

References:

[1] C. Fu, Z.L. Zhu, A chaotic image encryption scheme based on circular bit shift method, in: The 9th International Conference for Young Computer Scientists, 2008, pp. 3057-3061.; C. Fu, Z.L. Zhu, A chaotic image encryption scheme based on circular bit shift method, in: The 9th International Conference for Young Computer Scientists, 2008, pp. 3057-3061.
[2] Y.P. Zhang, F. Zuo, Z.J. Zhai, X.B. Cai, A new image encryption algorithm based on multiple chaos system, in: International Symposium on Electronic Commerce and Security, 2008, pp. 347-350.; Y.P. Zhang, F. Zuo, Z.J. Zhai, X.B. Cai, A new image encryption algorithm based on multiple chaos system, in: International Symposium on Electronic Commerce and Security, 2008, pp. 347-350.
[3] Huang, C. K.; Nien, H. H., Multi chaotic systems based pixel shuffle for image encryption, Optics Communications, 282, 2123-2127 (2009)
[4] Lian, S. G.; Sun, J. S.; Wang, Z. Q., A block cipher based on a suitable use of the chaotic standard map, International Journal of Chaos, Solitons and Fractals, 26, 1, 117-129 (2005) · Zbl 1093.37504
[5] Lian, S. G., A block cipher based on chaotic neural networks, Neurocomputing, 72, 1296-1301 (2009)
[6] Guan, Z. H.; Huang, F.; Guan, W., Chaos-based image encryption algorithm, Physics Letters A, 346, 153-157 (2005) · Zbl 1195.94056
[7] Pareek, N. K.; Patidar, V.; Sud, K. K., Image encryption using chaotic logistic map, Image and Vision Computing, 24, 9, 926-934 (2006)
[8] Lian, S. G., Efficient image or video encryption based on spatiotemporal chaos system, International Journal of Chaos, Solitons and Fractals, 40, 15, 2509-2510 (2009) · Zbl 1198.94030
[9] Pisarchik, A. N.; Zanin, M., Image encryption with chaotically coupled chaotic maps, Physica D, 237, 2638-2648 (2008) · Zbl 1148.94431
[10] J.M. Liu, S.S. Qiu, F. Xiang, H.J. Xiao, A cryptosystem based on multi-chaotic maps, in: International Symposiums on Information Processing, 2008, pp. 740-743.; J.M. Liu, S.S. Qiu, F. Xiang, H.J. Xiao, A cryptosystem based on multi-chaotic maps, in: International Symposiums on Information Processing, 2008, pp. 740-743.
[11] Adleman, Molecular computation of solutions of combinatiorial problems, Science, 266, 1021-1024 (1994)
[12] Xiao, G. Z.; Lu, M. X.; Qin, L.; Lai, X. J., New field of cryptography: DNA cryptography, Chinese Science Bulletin, 51, 12, 1413-1420 (2006) · Zbl 1108.94007
[13] Gehani, A.; LaBean, T. H.; Reif, J. H., DNA-based cryptography. DIMACS series in discrete mathematics, Theoretical Computer Science, 54, 233-249 (2000) · Zbl 0970.68055
[14] Celland, C. T.; Risca, V.; Bancroft, C., Hiding messages in DNA microdots, Nature, 399, 533-534 (1999)
[15] Kang Ning, A pseudo DNA cryptography method, arXiv:0903.2693; Kang Ning, A pseudo DNA cryptography method, arXiv:0903.2693
[16] H.J. Liu, Z.L. Zhu, H.Y. Jiang, B.L. Wang, A novel image encryption algorithm based on improved 3D chaotic cat map, in: The 9th International Conference for Young Computer Scientists, 2009, pp. 3016-3021.; H.J. Liu, Z.L. Zhu, H.Y. Jiang, B.L. Wang, A novel image encryption algorithm based on improved 3D chaotic cat map, in: The 9th International Conference for Young Computer Scientists, 2009, pp. 3016-3021.
[17] Allen, P. M.J.; Bernard, Y.; Philip, M. P., Article for analog vector algebra computation, BioSystems, 52, 175-180 (1999)
[18] W. Piotr, J.M. Jan, R.R. Witold, L. Bogdan, Adding numbers with DNA, in: International Conference on Systems, Man and Cybernetics, 2000, pp. 265-270.; W. Piotr, J.M. Jan, R.R. Witold, L. Bogdan, Adding numbers with DNA, in: International Conference on Systems, Man and Cybernetics, 2000, pp. 265-270.
[19] E.Z. Dong, Z.Q. Chen, Z.Z. Yuan, Z.P. Chen, A chaotic image encryption algorithm with the key mixing proportion factor, in: 2008 International Conference on Information Management, Innovation Management and Industrial Engineering, 2008, pp. 169-174.; E.Z. Dong, Z.Q. Chen, Z.Z. Yuan, Z.P. Chen, A chaotic image encryption algorithm with the key mixing proportion factor, in: 2008 International Conference on Information Management, Innovation Management and Industrial Engineering, 2008, pp. 169-174.
[20] L. Wang, Q. Ye, Y.Q. Xiao, et al. An image encryption scheme based on cross chaotic map, in: 2008 Congress on Image and Signal Processing, 2008, pp. 22-26.; L. Wang, Q. Ye, Y.Q. Xiao, et al. An image encryption scheme based on cross chaotic map, in: 2008 Congress on Image and Signal Processing, 2008, pp. 22-26.
[21] J. Peng, S.Z. Jin, Y.G. Liu, et al. A novel scheme for image encryption based on piecewise linear chaotic map, in: Cybernetics and Intelligent Systems, 2008, pp. 1012-1016.; J. Peng, S.Z. Jin, Y.G. Liu, et al. A novel scheme for image encryption based on piecewise linear chaotic map, in: Cybernetics and Intelligent Systems, 2008, pp. 1012-1016.
[22] M. Sabery, K.M. Yaghoobi, A new approach for image encryption using chaotic logistic map, in: 2008 International Conference on Advanced Computer Theory and Engineering, 2008, pp. 585-590.; M. Sabery, K.M. Yaghoobi, A new approach for image encryption using chaotic logistic map, in: 2008 International Conference on Advanced Computer Theory and Engineering, 2008, pp. 585-590.
[23] S.J. Xu, Y.L. Wang, J.Z. Wang, M. Tian, A novel image encryption scheme based on chaotic maps, in: ICSP, 9th International Conference on Signal Processing, 2008, pp. 1014-1018.; S.J. Xu, Y.L. Wang, J.Z. Wang, M. Tian, A novel image encryption scheme based on chaotic maps, in: ICSP, 9th International Conference on Signal Processing, 2008, pp. 1014-1018.
[24] Lian, S. G.; Sun, J. S.; Wang, Z. Q., Security analysis of a chaos-based image encryption algorithm, Physica A: Statistical and Theoretical Physics, 351, 2-4, 645-661 (2005)
[25] Shannon, C. E., Communication theory of security systems, Bell System Technical Journal, 28, 656-715 (1949) · Zbl 1200.94005
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.